Abstract
In order to ensure the secure transmission and storage of video content, this research work provides a video encryption algorithm using symmetric and asymmetric encryption methods. The suggested strategy offers strong defense against assaults through the combination of the Affine Cipher, RSA, and XOR techniques with randomly generated keys. The algorithm first breaks the video into manageable chunks, then proceeds to use the Affine Cipher method to generate a distinct keys at random for each chunk. The RSA technique is then employed to encrypt the keys, ensuring secure transfer to the recipient. To increase the security, a new key is generated for every individual video segment using a random number generator. The suggested strategy also encrypts the video data using the XOR method, adding another degree of protection. Without a compatible key, the encrypted video data cannot be viewed thanks to the XOR algorithm. The experimental findings demonstrate that the suggested method offers strong defense against a variety of attacks, including differential, statistical, and brute-force attacks. The algorithm also exhibits excellent efficiency by being able to encrypt and decrypt video data almost instantly. Encryption and decryption only take 174.25 and 136.38 nanoseconds, respectively, per pixel. The suggested algorithm offers a reliable, effective, and safe solution for video encryption, making it appropriate for usage in a variety of applications, such as online video streaming, video conferencing, and video surveillance.
Similar content being viewed by others
Data Availability
The data sets analyzed during the experimentation have been generated by the authors. The data can be shared whenever required.
References
Abed S, Waleed L, Aldamkhi G, Hadi K (2021) Enhancement in data security and integrity using the minhash technique. Indonesian Journal of Electrical Engineering and Computer Science 21. https://doi.org/10.11591/ijeecs.v21.i3.pp1739-1750
Albahrani EA, Alshekly TK, Lafta SH (2022) A Review on Audio Encryption Algorithms Using Chaos Maps-Based Techniques. https://doi.org/10.13052/jcsm2245-1439.1113
Ali M, Baloch A, Waheed A, Zareei M, Manzoor R, Sajid H, Alanazi F (2021) A simple and secure reformation-based password scheme. IEEE Access 9. https://doi.org/10.1109/ACCESS.2020.3049052
Alsaffar DM, Almutiri AS, Alqahtani B, Alamri RM, Alqahtani HF, Alqahtani NN, Alshammari GM, Ali AA (2020). Image encryp- tion based on AES and RSA algorithms. https://doi.org/10.1109/ICCAIS48893.2020.9096809
Al-Zubaidie M, Zhang Z, Zhang J (2019) Ramhu: A new robust, lightweight scheme for mutual user authentication in healthcare applications. Security and Communication Networks 2019. https://doi.org/10.1155/2019/3263902
Cheng H (2000) Partial encryption of compressed images and videos. IEEE Transactions on Signal Processing. https://doi.org/10.1109/78.852023
Cheng L, Liu F, Yao D (2017) Enterprise Data Breach: Causes, Challenges, Prevention, and Future Directions. WIREs Data Mining Knowl Discov 5(7):e1211. https://doi.org/10.1002/widm.1211
Cheng S, Wang L, Ao N, Han Q (2020) A selective video encryption scheme based on coding characteristics. Symmetry 12. https://doi.org/10.3390/sym12030332
Chepuri S (2017) An RGB image encryption using RSA algorithm. International Journal of Current Trends in Engineering Research (IJCTER) 3
Dhruv M, Manish J, Hartik S, Ramchandra M (2022) DieRoll: A Unique Key Generation and Encryption Technique. Journal of Applied Security Research. https://doi.org/10.1080/19361610.2022.2124589
Elkamchouchi H, Salama WM, Abouelseoud Y (2020) New video encryption schemes based on chaotic maps. IET Image Processing 14. https://doi.org/10.1049/iet-ipr.2018.5250
Elrefaey A, Sarhan A, El-Shennawy NM (2021) Parallel approaches to improve the speed of chaotic-maps-based encryption using GPU. Journal of Real-Time Image Processing 18. https://doi.org/10.1007/s11554-020-01064-w
Farik M, Nisha S (2017) RSA public key cryptography algorithm-a review. Article in International Journal of Scientific Technology Research 6
Guleria V, Mishra DC (2021) Multiple RGB image encryption algorithm with multilayers by affine hill cipher with FRDCT and Arnold transform. Fractals 29. https://doi.org/10.1142/S0218348X21501516
Hosny KM, Zaki MA, Lashin NA, Fouda MM, Hamza HM (2023) Multimedia Security Using Encryption: A Survey 2023. https://doi.org/10.1109/ACCESS.2023.3287858
Ighalo GI (2013) Using mono-alphabetic substitution to secure against threats and risk in information technology. IOSR Journal of Electronics and Communication Engineering. https://doi.org/10.9790/2834-0516064
Kanaad D, Junaid G, Ramchandra M (2023) Security enhancement and analysis of images using a novel Sudoku-based encryption algorithm. Journal of Information and Telecommunication. https://doi.org/10.1080/24751839.2023.2183802
Khlif N, Amor MB, Masmoudi N, Kammoun F (2020) A new evaluation of video encryption security with a perceptual metric. J Test Eval 48. https://doi.org/10.1520/JTE20160456
Kota CM, Aissi C (2022) Implementation of the RSA algorithm and its cryptanalysis. https://doi.org/10.18260/1-2-620-38785
Li X, Yu H, Zhang H, Jin X, Sun H, Liu J (2020) Video encryption based on hyperchaotic system. Multimedia Tools and Applications 79. https://doi.org/10.1007/s11042-020-09200-1
Lin R, Li S (2021) An image encryption scheme based on Lorenz hyperchaotic system and RSA algorithm. Security and Communication Networks 2021. https://doi.org/10.1155/2021/5586959
Liu F, Koenig H (2010). A Survey of Video Encryption Algorithms. https://doi.org/10.1016/j.cose.2009.06.004
Lone MA, Qureshi S (2022) RGB image encryption based on symmetric keys using Arnold transform, 3d chaotic map, and Affine Hill cipher. Optik 260. https://doi.org/10.1016/j.ijleo.2022.168880
Lone PN, Singh D, Mir UH (2021) A novel image encryption using random matrix Affine cipher and the chaotic maps. Journal of Modern Optics 68. https://doi.org/10.1080/09500340.2021.1924885
Masood F, Driss M, Boulila W, Ahmad J, Rehman SU, Jan SU, Qayyum A, Buchanan WJ (2021) A lightweight chaos-based med- ical image encryption scheme using random shuffling and xor operations. Wireless Personal Communications. https://doi.org/10.1007/s11277-021-08584-z
Massoudi A, Lefebvre F, Vleeschouwer CD, MacQ B, Quisquater JJ (2008) Overview on selective encryption of image and video: Challenges and perspectives. Eurasip Journal on Information Security 2008. https://doi.org/10.1155/2008/179290
Nilesh AL, (2017) A review of encryption algorithms-RSA and diffie-hellman. INTERNATIONAL JOURNAL OF SCIENTIFIC TECHNOLOGY RESEARCH
PD, Babu SS, Vijayalakshmi Y, (2020) Enhancement of e-commerce security through asymmetric key algorithm. Computer Communications 153. https://doi.org/10.1016/j.comcom.2020.01.033
Saeed B, Majid N (2012) Image encryption using a lightweight stream encryption algorithm. Advances in Multimedia. https://doi.org/10.1155/2012/767364
Setiadi, De Rosal Igantius Moses Setiadi (2021).: PSNR vs SSIM: imperceptibility quality assessment for image steganography. Multimed Tools Appl 80:8423–8444. https://doi.org/10.1007/s11042-020-10035-z
Shiguo L, Zhongxuan L, Zhen R, Haila W (2006) Secure advanced video coding based on selective encryption algorithms. IEEE Transactions on Consumer Electronics. https://doi.org/10.1109/TCE.2006.1649688
Simon B (2020) Document Fraud: Will Your Identity Be Secure in the Twenty-first Century?.: European Journal on Criminal Policy and Research 2020. https://doi.org/10.1007/s10610-020-09441-8
Simon Singh.(2003). The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography, Queue(1) 2003. https://doi.org/10.1145/966789.966797
Telem ANK, Feudjio C, Ramakrishnan B, Fotsin HB, Rajagopal K (2022) A simple image encryption based on binary image Affine transformation and zigzag process. Complexity. https://doi.org/10.1155/2022/3865820
Venkatesh K, Narasimhan D (2022) Mlpd: a multilayer protection with deduplication technique to preserve audio file transmission over the public domain. Soft Computing 26. https://doi.org/10.1007/s00500-022-06801-w
Xie D, Kuo CCJ (2007) Multimedia encryption with joint randomized entropy coding and rotation in partitioned bitstream. Eurasip Journal on Information Security 2007. https://doi.org/10.1155/2007/35262
You L, Yang E (2020) Wang GA (2020) novel parallel image encryption algorithm based on hybrid chaotic maps with OpenCL implementation. Soft Comput 24:12413–12427. https://doi.org/10.1007/s00500-020-04683-4
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflicts of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Parekh, A., Antani, M., Suvarna, K. et al. Multilayer symmetric and asymmetric technique for audiovisual cryptography. Multimed Tools Appl 83, 31465–31503 (2024). https://doi.org/10.1007/s11042-023-16401-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-16401-x